List of accepted papers

107 papers were submitted and 42 of them accepted for publication. Here is the list of accepted papers in alphabetical order.

  1. 3D Augmented Reality Software Solution for Mechanical Engineering Education (95)
    Yuksel Aliev, Vasil Kozov, Galina Ivanova, Aleksandar Ivanov
  2. A Comparison of Record and Play Honeypot Designs (57)
    Jarko Papalitsas, Sampsa Rauti, Ville Leppänen
  3. A Conceptual Model of a Virtual Collaboration Space for Bat Scientists (34)
    Angel Ivanov, Milena Georgieva, Stanimira Deleva, Daniela Orozova
  4. A conceptual model of an electronic appendix called "Nursing file for palliative care", for training students from the speciality of Nurse. (35)
    Greta Koleva, Despina Georgieva, Yavor Stefanov
  5. A Fine-Grained Access Control Model and Implementation (73)
    Ekaterina Gorskova, Boris Novikov, and Manoj Kumar Shukla
  6. A Practical Approach to Spam Mitigation (41)
    Dobrin Tashev
  7. A Survey on Application Sandboxing Techniques (45)
    Samuel Laurén, Sampsa Rauti, Ville Leppänen
  8. A system for website data management in a website building system (10)
    Dimitar Dimitrov
  9. An Affective Distant Learning Model Using Avatars as user stand-in (14)
    Leon Rothkrantz
  10. An algorithm for Micro-localization in Large Public Buildings (96)
    Rosen Ivanov
  11. An approach for mammography image segmentation (25)
    Mariana Stoeva, Violeta Bozhikova
  12. Ant colony optimization algorithm for traffic flow estimation (60)
    Milena Karova, Nikola Vasilev, Ivaylo Penev
  13. CutSurf – a software tool for cut surface evaluation of white cheese (29)
    Atanaska Bosakova-Ardenska, Hristina Andreeva, Petya Boyanova, Peter Panayotov
  14. Cyber Threat Hunting through the use of an Isolation Forest (71)
    Dimitar Karev, Chris McCubbin, Ruslan Vaulin
  15. Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol (59)
    Stavros D. Nikolopoulos, Iosif Polenakis
  16. Designing a Virtual Laboratory for Teaching Programming (2)
    Galya Shivacheva, Veselina Nedeva, Svetoslav Atanasov
  17. Evaluating coherence of essays using sentence-similarity networks (5)
    Kaja Zupanc, Miloš Savić, Zoran Bosnić, Mirjana Ivanović
  18. Extended Graph Backbone for Motif Analysis (116)
    Antonio Maratea, Alfredo Petrosino, Mario Manzo
  19. Fuzzy model of an intelligent agent behavior and method of fire extinguishing control (42)
    Aleksey Senkov, Aleksander Chepikov
  20. Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching (69)
    Antoniya Tasheva, Zhaneta Tasheva, Plamen Nakov
  21. Incremental Rerouting Algorithm for single-vehicle VRPPD (90)
    Roman Guralnik
  22. Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders (68)
    Adela Bara, Simona Vasilica Oprea, Adina Uta, Osman Bulent Tor, Mahmut Erkut Cebeci
  23. Intelligent Planting (26)
    Ivan Ivanov, Vasilen Tsvetkov
  24. Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks (7)
    Svetozar Ilchev, Zlatoliliya Ilcheva
  25. Is the Visitor Reading or Navigating? (83)
    Peter Krátky, Tomáš Repiský, Daniela Chudá
  26. Limited Resources Platform Implementation of Complex Event Processing System (36)
    Ján Lang, Peter Gabaš
  27. Mass-spring Cloth Simulation with Shape Matching (103)
    Tzvetomir Vassilev
  28. MATLAB-Based Software Tool for Implementation of Bifid Ciphers (28)
    Adriana Borodzhieva
  29. Measuring software security from the design of software (32)
    Marko Saarela, Shohreh Hosseinzadeh, Sami Hyrynsalmi, and Ville Leppänen
  30. Modelling of Educational Data Following Big Data Value Chain (16)
    Dessislava Petrova-Antonova, Olga Georgieva, Sylvia Ilieva
  31. Neural network application in financial area (91)
    Roumen Trifonov, Dilyana Budakova, Galya Pavlova
  32. Outlier detection via deep learning architecture (108)
    Irina Kakanakova, Stefan Stoyanov
  33. Pass-the-Hash – one of the most prevalent yet underrated attacks for credentials theft and reuse (63)
    Dimo Dimov, Yuliyan Tsonev
  34. Real Time GPU Accelerated Radar Scan Conversion and Visualization (99)
    Vesselin Pezhgorski, Milena Lazarova
  35. Requirements management in students’ software development projects (111)
    Pekka Mäkiaho, Timo T. Poranen, Zheying Zhan
  36. Situation calculus for multiple action representation (72)
    Michael Zernov
  37. Smart multifunctional digital content ecosystem using emotion analysis of voice (43)
    Alexander I. Iliev, Peter Stanchev
  38. Text classification based on enriched vector space model (21)
    Tsvetanka Georgieva-Trifonova
  39. Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine (65)
    Borislav Banchev
  40. Utility and Optimal Usage of ICT in Schools (87)
    Valentina Terzieva, Katia Todorova, Yuri Pavlov, Petia Kademova-Katzarova
  41. What should application developers understand about mobile phone position data (48)
    Oskari Jahkola, Ari Happonen, Antti Knutas, Jouni Ikonen
  42. “Compatible” Fuzzy Cognitive Maps For Direct And Inverse Inference (52)
    Vadim Borisov, Alexander Fedulov, Yaroslav Fedulov


 
      << Menu